Link | Resource |
---|---|
https://kb.isc.org/docs/cve-2021-25217 | Exploit Vendor Advisory |
http://www.openwall.com/lists/oss-security/2021/05/26/6 | Mailing List Patch |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2LB42JWIV4M4WDNXX5VGIP26FEYWKIF/ | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/06/msg00002.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5QI4DYC7J4BGHEW3NH4XHMWTHYC36UK4/ | Mailing List Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-406691.pdf | Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220325-0011/ | Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf | Patch Third Party Advisory |
Configuration 1
|
Published : 2021-05-26 10:15
Updated : 2022-10-29 02:48
NVD link : CVE-2021-25217
Mitre link : CVE-2021-25217
Improper Restriction of Operations within the Bounds of a Memory Buffer